How to use a VPN to keep your network data safe

Cloak for Mac OS

Cloak for Mac OS

We've spent the last two weeks looking at applications you can use to protect your computer from unauthorized access: Apple's built-in firewall for incoming access and Little Snitch for monitoring both inbound and outbound network access. But how do you keep people from looking at your network traffic while you're on public Wi-Fi networks, such as those provided by your ISP, your favorite coffee shop, or the local library?

When you're on public (read that untrusted) networks it's possible for someone on the same network to capture and unwrap your network traffic and essentially "listen" to your network conversations. This could potentially expose data you're sending and receiving if your network data isn't encrypted in some fashion.

When you connect to sites such as or your web banking service your network traffic is usually encrypted to keep your data safe, but there are many instances when sites you're connecting to may be allowing that data to travel from your computer to their servers in the clear. On untrusted public networks this means it's possible for nefarious individuals using packet sniffing software, such as Wireshark, to look at your private data. To avoid this kind of exposure on public networks it's wise to use a Virtual Private Network (VPN) to keep your data safe.

Typically, we think of VPNs in relation to securing corporate network data when employees are working remotely. You can also use a VPN to secure your network data on unsecured network connections until that data gets to place where you know it's safe. That's where apps such as Cloak come into play.

Last year, Dan Moren selected Cloak 2 as a staff pick for securing unsecured Internet connections on your iOS devices because it's easy to use and relatively inexpensive to maintain. (You can purchase anything from a 5GB per month plan for $3, a weekly pass with unlimited data for $4, to yearly passes for $100.) Now, in addition to securing your iOS devices, Cloak works on your Mac too. And all your devices can share whichever plan you choose to use.

Plus, you can try Cloak on for free for 30 days before you have to choose a plan.

Set up a Cloak account

Before you can begin using Cloak you need to create an account. To do that:

  • Go to and click the link that says "Try free for 30 days".
  • Provide your email address and create a password for the service.
  • Check your email for an Almost There message to validate your email address. (For me this went directly to spam, so you may want to check your spam filter if it doens't show up immediately.)
  • When you respond to the Almost There email message your 30-day free trial account will be created.

You don't need a credit card to begin using Cloak. It's free to try. You'll only need to add a credit card if you decide to continue using the service.

Next you need to set up the Cloak apps you want using Cloak's VPN service.

Setup Cloak for Mac

Cloak's Mac app is super simple to set up:

  • Download the app.
  • Drag the Cloak app to your Applications folder.
  • Open Cloak.
  • Cloak installs a menu extra in your menubar. Locate and click the menu extra.
  • Click the button that says "Log in to existing account" and enter your account information.

Once Cloak is installed and running it will automatically use VPN to secure networks with unsecure connections. You can change and manage the way the app behaves using Cloak's preferences.

The iOS app

Using Cloak on your iOS device is easy, but, although you have to install an app, it isn't as simple as downloading an app. In order to perform its magic, Cloak first needs to install a Configuration Profile to create the VPN connection you need to secure your network traffic on unsecure networks.

To install Cloak on your iOS device:

  • Download the Cloak app from the App Store.
  • Open the cloak app and enter your account information.
  • Cloak will redirect you to the Cloak website where you will be prompted to install Cloak's configuration profile.
  • Agree to each of the prompts as the configuration profile is installed.

Once the Configuration Profile is installed you will have two VPN configurations available, one that you can turn on manually and the default VPN which is turned on automatically when an unsecure network connection is detected.

If you make any settings changes to Cloak you will be prompted to re-download and install the configuration profiles to update your settings.

Join the CSO newsletter!

Error: Please check your email address.

Tags Wi-Fiamazon.comNetworkingsecurityvpnVPNswirelessWLANs / Wi-Fisecurity software

More about Amazon.comAppleClick

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Jeffery Battersby

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place